Confidentiality and Systems Usage Breach Policy - WORD

advertisement
For Munson Use Only
If used as a template, MUST change name of agency and details to reflect YOUR practice
HIPAA: Confidentiality and Systems Usage Breach Policy
POLICY: Workforce Members must protect patient and business information at all times. This
policy outlines a consistent process for sanctioning breaches of confidentiality and inappropriate
use of information systems, and supports MHC Policy on HIPAA Privacy and Security Incident
Management. The purpose of this policy is to provide a fair, clear, and consistent sanctions
system for employees involved in a privacy or security breach, as well as to comply with HIPAA
recommendations for a Sanctions policy. Sanctions are an important part of the remedial action
plan to prevent further privacy or security breaches. Human Resources and Management
maintains final authority for disciplinary consequences, with input/recommendation from the
Privacy and Security Officer.
A Security Review Board oversees organization compliance with HIPAA on a quarterly basis.
Workforce members’ obligations to confidentiality are defined in MHC Policy 01.04,
Confidentiality of Patient Information, as well as Munson Healthcare’s Confidentiality &
Systems Usage Agreement; permissible use and disclosure of PHI is described in policy 012.010,
Use and Disclosure of Protected Health Information.
SUMMARY OF CONFIDENTIALITY AND SYSTEMS USAGE CONDUCT:
Confidential Information – whether communicated verbally or by handwriting, printed paper, or
electronic format – must be acquired, accessed, used or disclosed only to specifically support a
patient care need, a business need, a legal need, or with the express written authorization of the
patient or his/her legal representative.
Workforce members must seek and disclose the minimum amount of confidential
information necessary to carry out their duties. Access to the records of family members,
friends, co-workers, or other individuals is strictly prohibited (unless there is a job-related
need or proper
e-authorization is on file (see policy 012.015).
All system access must be under each individual’s own ID; sharing of passwords or doing work
under someone else’s account is a violation of law and policy. Workforce members are
responsible for all activity recorded under their own IDs.
Stricter state and federal laws require the most restrictive degree of confidentiality for
mental health, substance abuse, certain infectious disease information and patients
requesting to opt out of the facility directory. Note, the appendix of this policy includes key
definitions regarding certain infectious diseases that may elevate the severity of breach of
privacy.
PROCEDURE
Potential breaches identified by audits occurrence reporting, patient complaints, or any other
means are reviewed, investigated, and documented by the Privacy Officer. Privacy Officer may
consult with appropriate personnel such as Security Officer, Medical Director of Information
Systems, employee’s Manager, Risk Management, Legal Counsel and Human Resources. A
breach is deemed to be a privacy breach when it meets HIPAA’s Final Rule definition of Breach:
The acquisition, access use or disclosure of PHI in a manner not permitted under the HIPAA
Privacy Rule which compromises the security or privacy of the PHI.
Each acquisition, access, use or disclosure of PHI not permitted under the HIPAA Privacy Rule
will be considered a Breach unless a Risk Assessment demonstrates that there is a low
probability that the PHI has been compromised. Munson’s Privacy Officer will conduct the Risk
Assessment which will include consideration of the following four factors:
1.
2.
3.
4.
Whether the acquisition, access, use or disclosure violates the HIPAA Privacy Rule;
Whether the PHI involved was “unsecured”
Whether an exception to the definition of “breach” may apply and
Whether there was a low probability that the PHI has been compromised.
Low probability of PHI compromise will be determined by consideration and examination of, at
a minimum, the following four factors:
1) The nature and extent of PHI involved, including the types of patient identifiers and the
likelihood of re-identification
2) Who was the person who accessed the PHI and to whom was it disclosed?
3) Was the PHI actually acquired or viewed?
4) The extent to which the risk to the PHI has been mitigated.
All Risk Assessments that are conducted shall be documented and maintained by the Privacy
Officer for seven years. If a low probability or risk cannot be demonstrated, or if Covered Entity
decides to send the Breach Notification letter in lieu of an entire risk analysis, still, decision
making process for both will be documented, with emphasis on identifying gaps in privacy or
security and remedial action.
Every breach of confidentiality, security, and/or violation of information systems usage policy
that violates HIPAA introduces the potential for corrective action. The focus is now on the risk
to the PHI and not a “harm threshold” for the patient. When determining appropriate corrective
action for a given violation, the Privacy and Security Officer, Human Resources, Management
(and if needed, Risk Management and Legal Counsel) will consider several factors including but
not limited to:
1.
How sensitive is the PHI in nature? For example, social security numbers, credit
card numbers, or information that could cause harm to the individual?
2.
Was the PHI disclosed to another covered entity? Could reassurances be given
that the PHI would not be further used or disclosed?
3.
How many patients are affected? How much PHI was compromised? What is the
likelihood that the patient could be identified?
4.
What other facts does the forensic analysis, audits, or investigation reveal?
5.
Does the person who breached PHI stand to benefit from the use of the PHI?
6. Does the breach meet any of the HIPAA exceptions for 1) unintentional or
inadvertent disclosures not further disclosed or 2) person not able to retain PHI
information?
7. Does the PHI involve mental health, substance abuse, sensitive infectious disease
information, and patients requesting to opt out of the facility directory? Breaches of
this type may result in higher levels of disciplinary consequences.
In the case of any sanction imposed on an employee, if corrective action already exists in the
employee’s personnel file, then the corrective action issued under this policy will be escalated in
accordance with existing Human Resources corrective action policies.
Violations and resulting sanctions are evaluated based on the following guidelines:
1) Human Resources have the final authority regarding level of sanction deemed appropriate
for employee and the situation. Employee’s manager has input into this process.
2) The Privacy Officer will serve as a resource for investigation and audit detail.
3) The Privacy Officer will conduct the risk assessment to determine probability of risk to
PHI, in collaboration with one of more of the following key personnel: Security Officer,
IS Director, Risk Management, or Legal Counsel.
Sanctions are carried out as follows.
For employees and volunteers, the employee’s manager and the Human Resources
department, will implement the sanctions.
For members of the medical staff and their respective office staff, the Privacy Office and
Medical Director of information Security determination of a breach level and
recommendation for hospital-based sanctions will initially be made to a Medical Staff
Advisory Committee consisting of the President and President-elect of the Medical
Staff, the chair of the Physician Well-Being Committee, and the VPMA. This group
will subsequently make a recommendation to the Medical Executive Committee
(MEC). The MEC will act upon the recommendation of the group. The MEC will
report back to the Privacy Office regarding sanctions imposed and exceptions approved.
Any requests for appeal of sanctions by members of the medical staff will be handled by
the MEC, as per current by-laws or policy.
PRIVACY AND SECURITY INCIDENT SEVERITY SCALE GUIDELINE WITH RECOMMENDED DISCIPLINARY ACTIONS
Risk of Compromised PHI and Consideration of Harm
Low risk of
compromised PHI,
and no harm to
patient or
organization
Moderate risk of compromised PHI,
unknown harm to patient or
organization: (cannot demonstrate low
risk)
No BreachNotification
required.
Breach Notification Required
MAJOR
Multiple patients
affected/Multiple
PHI/Major harm
(or potential harm)
to patient, or
organization
Breach Notification
Required
,
Encrypted or meets a HIPAA exception.
UNINTENTIONAL: No known or believed
intent; or inadvertent mistake; or
carelessness.
1
2
2
2
2 - 3
4
4
4
4
Note: if mobile device lost or stolen due to no
fault of staff, Major harm consequence may
be reduced to 1
INTENTIONAL: Due to curiosity or concern;
or negligence
MALICIOUS OR UNETHICAL intent
including use of info in a domestic dispute;
Personal financial gain; Willful or reckless
disregard of policies, procedures or law.
DISCIPLINARY RECOMMENDATIONS:
1 (White):
No Action, or a Verbal Warning with Re-education, or Process Improvement
2 (Yellow):
Written Warning or Final Written Warning;
3 (Orange):
Final Written Warning or Termination;
4 (Red):
Termination.
APPENDIX:
KEY DEFINITIONS
Confidential Information constitutes either of the following:
Business Information: Any information regarding the business and operations of
any of the Munson Healthcare system entities (“Entities”) obtained during the
course of your work or association with the Entities. This may include, but is not
limited to, information concerning employees, physicians, financial operations,
quality assurance, utilization review, risk management, research, procurement,
contracting, and other operational information.
Protected Health Information (“PHI”) means information that: (i) is created or
received by a Health Care Provider, Health Plan, or Health Care Clearinghouse;
(ii) relates to the past, present or future physical or mental health or condition of
an Individual; the provision of Health Care to an Individual, or the past, present or
future Payment for the provision of Health Care to an Individual; and (iii)
identifies the Individual (or for which there is a reasonable basis for believing that
the information can be used to identify the Individual).
Workforce or Workforce Member means employees, volunteers, trainees, and other persons
whose conduct, in the performance of work for the Facility, is under the direct control of such
Entity, whether or not they are paid by the Facility.
Certain Infectious Disease Information: Public Health Laws have been invoked from time to
time when there is improper access to or disclosure of protected health information relating to a
patient’s infectious disease, when the improper access or disclosure causes great harm (or the
potential for great harm) to that person.
Diseases such as sexually transmitted diseases (STDs) can cause harm to patients if the
information is disclosed beyond patient care needs. Examples of STDs that elevate the potential
or actual level of harm include:
Acquired Immunodeficiency Syndrome (AIDS)
Chlamydia trachomatis (Genital infections), (LGV)
HIV (Confirmed positive HIV serology and detection tests; CD4 counts/percents
and all viral loads on people already known to be infected)
Neisseria gonorrhoeae (Gonorrhea)
Treponema pallidum (Syphilis)
This list is not all-inclusive and judgment should always be used about what other types of
infectious diseases may be similar in nature.
Download